Skip to Main Content
Android Malware and Analysis
book

Android Malware and Analysis

by Ken Dunham, Shane Hartman, Manu Quintans, Jose Andre Morales, Tim Strazzere
October 2014
Intermediate to advanced content levelIntermediate to advanced
242 pages
5h 24m
English
Auerbach Publications
Content preview from Android Malware and Analysis
87
android Malware trends and reversing taCtiCs
clear though, it does exactly as it describes. e DownloadText initiates
an HTTP get request to the server built above, http://l0rdzs0ldierz.com/
command.php?action=recv, and then parses the response saving it into
the previously initialized array. Upon returning into the background
task, we see the sendTextMessage code being executed.
is will essentially send the text message to the phone number
pulled from the server, with the corresponding text spam. In the cases
Image 6.6 SpamSoldier TestService sending text messages.
Image 6.7 SpamSoldier TestService C&C communication.
88
android Malware and
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Android Security

Android Security

Anmol Misra, Abhishek Dubey
Hacking Android

Hacking Android

Mohammed A. Imran, Srinivasa Rao Kotipalli

Publisher Resources

ISBN: 9781482252200